mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

813
active users

#malware

43 posts32 participants3 posts today
kalvn<p>L&#39;IA invente parfois des noms de packages qui n&#39;existent pas et essayent de les télécharger (vibe coding, tout ça). Alors des gens ont créé ces packages sous forme de malware. Évidemment.</p><p>🔗 <a href="https://www.theregister.com/AMP/2025/04/12/ai_code_suggestions_sabotage_supply_chain/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/AMP/2025/04/12</span><span class="invisible">/ai_code_suggestions_sabotage_supply_chain/</span></a></p><p><a href="https://mastodon.xyz/tags/intelligenceartificielle" class="mention hashtag" rel="tag">#<span>intelligenceartificielle</span></a> <a href="https://mastodon.xyz/tags/malware" class="mention hashtag" rel="tag">#<span>malware</span></a> <a href="https://mastodon.xyz/tags/package" class="mention hashtag" rel="tag">#<span>package</span></a></p>
securityaffairs<p>SECURITY AFFAIRS <a href="https://infosec.exchange/tags/MALWARE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MALWARE</span></a> <a href="https://infosec.exchange/tags/NEWSLETTER" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NEWSLETTER</span></a> ROUND 41<br><a href="https://securityaffairs.com/176503/malware/security-affairs-malware-newsletter-round-41.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176503/mal</span><span class="invisible">ware/security-affairs-malware-newsletter-round-41.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
@990000@mstdn.social<p>Haha nice </p><p><a href="https://mstdn.social/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> <a href="https://mstdn.social/tags/CyberPunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberPunk</span></a> <a href="https://mstdn.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> </p><p><a href="https://bsky.app/profile/thomasfuchs.at/post/3lmnqvt35bk2z" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bsky.app/profile/thomasfuchs.a</span><span class="invisible">t/post/3lmnqvt35bk2z</span></a></p>
Marc Ruef :verified:<p>Ransomware Reaches A Record High, But Payouts Are Dwindling <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://www.tripwire.com/state-of-security/ransomware-reaches-record-high-payouts-are-dwindling" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/ransomware-reaches-record-high-payouts-are-dwindling</span></a></p>
Tâi Siáu-káu 台痟狗 ㄊㄇㄉ 🇳🇫 台灣國<p>List of apps affected by <a href="https://mstdn.social/tags/BadBazaar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadBazaar</span></a> and <a href="https://mstdn.social/tags/Moonshine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Moonshine</span></a> <a href="https://mstdn.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> begins on p. 20 of this document.<br><a href="https://www.ncsc.gov.uk/files/NCSC-Advisory-BADBAZAAR-and-MOONSHINE-guidance.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncsc.gov.uk/files/NCSC-Advisor</span><span class="invisible">y-BADBAZAAR-and-MOONSHINE-guidance.pdf</span></a></p>
Tâi Siáu-káu 台痟狗 ㄊㄇㄉ 🇳🇫 台灣國<p><span class="h-card" translate="no"><a href="https://tldr.nettime.org/@remixtures" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>remixtures</span></a></span> <br>List of apps affected by <a href="https://mstdn.social/tags/BadBazaar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BadBazaar</span></a> and <a href="https://mstdn.social/tags/Moonshine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Moonshine</span></a> <a href="https://mstdn.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> begins on p. 20 of this document.<br><a href="https://www.ncsc.gov.uk/files/NCSC-Advisory-BADBAZAAR-and-MOONSHINE-guidance.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncsc.gov.uk/files/NCSC-Advisor</span><span class="invisible">y-BADBAZAAR-and-MOONSHINE-guidance.pdf</span></a></p>
Tarnkappe.info<p>📬 Im Visier von Europol: Operation Endgame führt zu weiteren Verhaftungen<br><a href="https://social.tchncs.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/Botnetze" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnetze</span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/DropperMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DropperMalware</span></a> <a href="https://social.tchncs.de/tags/europol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europol</span></a> <a href="https://social.tchncs.de/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OperationEndgame</span></a> <a href="https://social.tchncs.de/tags/RansomwareInfrastruktur" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareInfrastruktur</span></a> <a href="https://sc.tarnkappe.info/6f90b6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/6f90b6</span><span class="invisible"></span></a></p>
Bill<p>Well...shit. So much for captcha.</p><p><a href="https://www.sentinelone.com/labs/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sentinelone.com/labs/akirabot-</span><span class="invisible">ai-powered-bot-bypasses-captchas-spams-websites-at-scale/</span></a></p><p><a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
heise online<p>Gericht nennt Details zu Angriffen auf 1223 WhatsApp-User mit Pegasus-Spyware</p><p>Ein Gerichtsdokument verrät Standorte der Opfer, für die Angriffe genutzte Server und die Herkunft der Angriffe mit der Pegasus-Spyware auf eine WhatsApp-Lücke.</p><p><a href="https://www.heise.de/news/Gericht-nennt-Details-zu-Angriffen-auf-1223-WhatsApp-User-mit-Pegasus-Spyware-10348270.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Gericht-nennt-De</span><span class="invisible">tails-zu-Angriffen-auf-1223-WhatsApp-User-mit-Pegasus-Spyware-10348270.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Messaging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Messaging</span></a> <a href="https://social.heise.de/tags/MetaPlatforms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MetaPlatforms</span></a> <a href="https://social.heise.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.heise.de/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://social.heise.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://social.heise.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Überwachung</span></a> <a href="https://social.heise.de/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
The New Oil<p>Police detains <a href="https://mastodon.thenewoil.org/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smokeloader</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> customers, seizes servers</p><p><a href="https://www.bleepingcomputer.com/news/security/police-detains-smokeloader-malware-customers-seizes-servers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/police-detains-smokeloader-malware-customers-seizes-servers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
OTX Bot<p>Newly Registered Domains Distributing SpyNote Malware</p><p>Deceptive websites hosted on newly registered domains are being used to deliver AndroidOS SpyNote malware, mimicking the Google Chrome install page on the Google Play Store. The campaign utilizes a mix of English and Chinese-language delivery sites, with Chinese-language comments in the code. The malware is distributed through a two-stage installation process, using an APK dropper to deploy the core SpyNote RAT. SpyNote is a potent Android remote access trojan capable of extensive surveillance, data exfiltration, and remote control. It aggressively requests numerous intrusive permissions, allowing for theft of sensitive data and significant remote access capabilities. The malware's keylogging functionality and ability to manipulate calls, activate cameras and microphones, and remotely wipe data make it a formidable tool for espionage and cybercrime.</p><p>Pulse ID: 67f80a4aa4c9d5d796071af6<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67f80a4aa4c9d5d796071af6" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67f80</span><span class="invisible">a4aa4c9d5d796071af6</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-10 18:13:30</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/APK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APK</span></a> <a href="https://social.raytec.co/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://social.raytec.co/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://social.raytec.co/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://social.raytec.co/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/GooglePlay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GooglePlay</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Mimic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mimic</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RemoteAccessTrojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteAccessTrojan</span></a> <a href="https://social.raytec.co/tags/SpyNote" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpyNote</span></a> <a href="https://social.raytec.co/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Andrew 🌻 Brandt 🐇<p>However, because this attack has been going on for two weeks, some endpoint protection tools (well, about a third of them) are catching on that this particular file is bad, and should feel bad.</p><p><a href="https://www.virustotal.com/gui/file/13d71b884a0625f3aa3805fb779d95513d0485671ab8c090a0c790ceda071e63" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/file/13d71b</span><span class="invisible">884a0625f3aa3805fb779d95513d0485671ab8c090a0c790ceda071e63</span></a></p><p>The most important lesson here is that attackers always come up with new ways to evade detection. Using a commercially available, normally legitimate remote access tool with a valid cryptographic signature lets the attacker bypass some kinds of endpoint detection.</p><p>Remember to check the From: address in emails, and the destination of any links they point to. You can do this by hovering your mouse over the link without clicking, and waiting a second. If it says it's from the SSA, but it isn't pointing to SSA.gov, then it's a lie. </p><p>If you find content like this useful, please follow me here, or on LinkedIn: <a href="https://www.linkedin.com/in/andrew-brandt-9603682/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/in/andrew-brandt-</span><span class="invisible">9603682/</span></a></p><p>9/fin</p><p><a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a></p>
The New Oil<p>Fake <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.thenewoil.org/tags/Office" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office</span></a> add-in tools push <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> via <a href="https://mastodon.thenewoil.org/tags/SourceForge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SourceForge</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Andrew 🌻 Brandt 🐇<p>When clicked, the button delivers malware, but it's an unexpected payload: A client installer for the commercial remote-access tool ConnectWise. </p><p>Every time I clicked the download link, it gave me the same file with six different random digits appended to the filename. Note that it is not, as the website implies, a PDF document, but a Windows executable file, with a .exe extension.</p><p>8/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a></p>
Andrew 🌻 Brandt 🐇<p>This is where I tell you: don't do this! I am a trained professional. I click all the bad links so you don't have to. I am going to show you what happens next.</p><p>A button appears on this page, labeled "Access Your Statement." The site serving up this payload delivers a file named "Social Security Statement Documents [six digit random number].exe"</p><p>7/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>
Andrew 🌻 Brandt 🐇<p>Finally the target lands on a page on the InMotion site that closely resembles the look-and-feel of the content in the email message. </p><p>The page tells the visitor, in part "Download your statement as a PDF file" and "For security reasons, we recommend accessing your statement through your secure device."</p><p>Spoiler alert: It was not a PDF file.</p><p>(Edit: A reader informs me that this appears to be the hosting space used by the temp agency website, and that for whatever reason, the URL appears differently here.) </p><p>6/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>
Andrew 🌻 Brandt 🐇<p>The target's browser then lands on another website, hosted by a large hosting service, InMotion Hosting. As with the temp agency website, the attackers have set up multiple URLs on this site, where the first URL performs a 302 redirect to go to the second URL, for no apparent reason other than to create the URL equivalent of a Rube Goldberg contraption.</p><p>5/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>
Andrew 🌻 Brandt 🐇<p>That link then immediately 302 redirects the target's browser to a link on a second website, one that belongs to a temp agency based in the US state of Maryland. </p><p>The attackers have created two URLs on this company's site for this purpose. The first one redirects to the second one. </p><p>Again, the site appears to have been compromised and used specifically for the purpose of obfuscating the redirection chain.</p><p>4/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>
Andrew 🌻 Brandt 🐇<p>The first 302 redirect points to a page on a website belonging to a small business that has, apparently, been compromised and abused for this purpose. </p><p>3/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>
Andrew 🌻 Brandt 🐇<p>In this attack, the spammers have been sending emails that look like this official-appearing notification from the Social Security Administration. </p><p>The message says "Your Social Security Statement is ready to review" and includes a button at the bottom labeled "Download Statement." </p><p>The button links to a shortened URL that uses the link-shortening service t.ly to lead the target to a chain of 302 redirects. Malware spammers often do this to fool web reputation services and obfuscate the final destination of the link.</p><p>2/</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a></p>